WO2016078541A1 - 一种提升终端安全性的装置及方法 - Google Patents
一种提升终端安全性的装置及方法 Download PDFInfo
- Publication number
- WO2016078541A1 WO2016078541A1 PCT/CN2015/094457 CN2015094457W WO2016078541A1 WO 2016078541 A1 WO2016078541 A1 WO 2016078541A1 CN 2015094457 W CN2015094457 W CN 2015094457W WO 2016078541 A1 WO2016078541 A1 WO 2016078541A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- user
- voiceprint feature
- owner
- dynamic password
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000012806 monitoring device Methods 0.000 claims abstract description 54
- 238000012545 processing Methods 0.000 claims description 36
- 239000000284 extract Substances 0.000 claims description 16
- 238000000605 extraction Methods 0.000 claims description 12
- 238000006243 chemical reaction Methods 0.000 claims description 10
- 238000010586 diagram Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 6
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 239000000470 constituent Substances 0.000 description 2
- 230000000694 effects Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Definitions
- the present invention relates to the field of communications, and in particular, to an apparatus and method for improving terminal security.
- the terminal screen locking mode is generally adopted in the prior art to improve the security of the user using the terminal.
- the terminal screen unlocking generally adopts a fixed digital password.
- the user inputs a fixed digital password by tapping the screen to unlock the terminal screen, and the user can completely control the terminal, including allowing the user to access the private content of the owner in the terminal.
- Embodiments of the present invention provide an apparatus and method for improving terminal security to improve terminal security.
- an embodiment of the present invention provides an apparatus for improving security of a terminal, including:
- the startup module is configured to randomly generate a dynamic password, display the dynamic password on the interface display, and start the voice monitoring device;
- a conversion extraction module configured to receive dynamics on a user read display interface obtained by the voice monitoring device The voice information at the time of the password, converting the voice information into a text password, and extracting the voiceprint feature of the voice information;
- a processing module configured to obtain a text password converted by the conversion extraction module and the extracted voiceprint feature, and a dynamic password generated by the startup module; when determining that the text password is the same as the dynamic password, according to the voiceprint feature and the pre-stored terminal usage rights and Corresponding relationship between the voiceprint features, determining the user's terminal usage rights, and setting the display interface to the unlock state or the lock screen state according to the determined terminal usage rights; when determining that the text password is different from the dynamic password, setting the display interface to Lock screen status.
- the processing module when the processing module pre-stores the correspondence between the terminal usage rights and the voiceprint features, the processing module is specifically configured to:
- the correspondence between the voiceprint feature, the user identity, and the terminal usage rights is saved according to a preset setting.
- the correspondence between the stored voiceprint features, the user identity, and the terminal usage rights according to the preset setting includes:
- the corresponding terminal usage rights are completely controlled.
- the corresponding terminal usage rights are partially controlled.
- the corresponding terminal usage right is prohibited control.
- the processing module sets the display interface to an unlocked state or a lock screen according to the determined terminal usage rights Status, including:
- the processing module determines that the user terminal usage right is full control, sets the display interface to the unlock state, and allows the user to access all content on the terminal;
- the processing module determines that the terminal usage right of the user is part of the control, sets the display interface to the unlocked state, and allows the user to access a preset part of the content on the terminal;
- the processing module determines that the user's terminal usage right is prohibition control, sets the display interface to a lock screen state, and prohibits the user from accessing all content on the terminal.
- the processing module is further configured to:
- the voiceprint feature extracted by the extraction extraction module does not exist, it is determined that the user terminal usage right is prohibited control, and the display interface is set to the lock screen state, and the user is prohibited from accessing. Everything on the terminal.
- the processing module is further configured to:
- the dynamic password is randomly generated by the startup module, and the dynamic password is displayed on the interface.
- Displaying and starting the voice monitoring device receiving, by the conversion extraction module, the voice information obtained by the voice listening device when the user reads the dynamic password on the display interface, converting the voice information into a text password, and extracting the voiceprint feature of the voice information;
- the processing module acquires the text password converted by the conversion extraction module and the extracted voiceprint feature, and the dynamic password generated by the startup module; when determining that the text password is the same as the dynamic password, according to the voiceprint feature and the pre-stored terminal usage authority and voiceprint feature
- the corresponding relationship determines the user's terminal usage rights, and sets the display interface to the unlocked state or the lock screen state according to the determined terminal use permission; when it is determined that the text password is different from the dynamic password, the display interface is set to the lock screen state. That is, through the double matching of the password and the user identity, the range of the content of the terminal allowed to access the terminal when the user uses the terminal is determined, the
- an embodiment of the present invention provides a method for improving security of a terminal, including:
- the terminal displays the randomly generated dynamic password through the display interface, and starts the voice monitoring device of the terminal;
- the terminal obtains the voice information when the user reads the dynamic password through the voice monitoring device, converts the voice information into a text password, and extracts the voiceprint feature of the voice information;
- the terminal determines the user's terminal usage authority according to the voiceprint feature and the pre-stored correspondence between the terminal usage authority and the voiceprint feature, and sets the unlock state of the display interface according to the determined terminal usage authority. Or lock screen status; or
- the terminal sets the display interface to the lock screen state.
- the terminal pre-stores the correspondence between the terminal usage rights and the voiceprint features by the following steps:
- the terminal acquires voice information of different users through the voice monitoring device, and extracts voiceprint features of the voice information;
- the terminal saves the correspondence between voiceprint features, user identity, and terminal usage rights according to preset settings. relationship.
- the correspondence between the voiceprint feature, the user identity, and the terminal usage rights includes:
- the corresponding terminal usage rights are completely controlled.
- the corresponding terminal usage rights are partially controlled.
- the corresponding terminal usage right is prohibited control.
- the terminal sets the unlock state or the lock screen state of the display interface according to the determined terminal usage rights, including:
- the terminal determines that the user's terminal usage right is full control, sets the display interface to the unlock state, and allows the user to access all content on the terminal;
- the terminal determines that the terminal usage right of the user is part of the control, and sets the display interface to the unlocked state, allowing the user to access a preset part of the content on the terminal;
- the terminal determines that the user's terminal usage right is prohibition control, sets the display interface to a lock screen state, and prohibits the user from accessing all content on the terminal.
- the method further includes:
- the terminal determines that the user's terminal usage right is the prohibition control, and sets the display interface to the lock screen state, prohibiting the user from accessing all the content on the terminal.
- the method further includes:
- the terminal sends the voice information when the user reads the dynamic password obtained by the voice monitoring device to the preset contact address;
- the terminal sends the voice information and the terminal location information when the user reads the dynamic password obtained by the voice monitoring device to the preset contact address;
- the terminal sends the terminal location information to a preset contact address
- the terminal notifies the owner to remotely destroy the private file on the terminal.
- the terminal displays the randomly generated dynamic password through the display interface, and starts the voice monitoring device of the terminal; the terminal acquires the voice information when the user reads the dynamic password through the voice monitoring device, converts the voice information into a text password, and extracts the voice information.
- the voiceprint feature according to the matching result of the text password and the dynamic password, and the matching result of the corresponding relationship between the voiceprint feature and the pre-stored terminal usage authority and the voiceprint feature, setting the unlock state or the lock screen state of the terminal display interface, and
- the user's terminal usage right is determined, that is, the double matching of the password and the user identity is used to determine the range of the user's access to the terminal when the user uses the terminal, thereby preventing the private file leakage of the owner on the terminal, thereby improving terminal security.
- FIG. 1 is a schematic structural diagram of an apparatus for improving security of a terminal according to an embodiment of the present invention
- FIG. 2 is a schematic flowchart of a method for improving security of a terminal according to an embodiment of the present invention
- FIG. 3 is a schematic diagram of a terminal display interface according to an embodiment of the present invention.
- FIG. 3b is a schematic diagram of a terminal display interface according to an embodiment of the present invention.
- FIG. 4 is a schematic flowchart of a method for improving security of a terminal according to an embodiment of the present disclosure
- FIG. 5 is a schematic structural diagram of an apparatus for improving security of a terminal according to an embodiment of the present invention.
- Embodiments of the present invention provide an apparatus and method for improving terminal security to improve terminal security.
- the terminal includes a smart phone (SP), a personal digital mobile terminal (Pad), etc.
- the operating system of the terminal may be one of the following operating systems: Android (Android), Saipan, and IOS (Apple's Mobile operating system, ie iPhone mobile operating system), Windows Phone (Microsoft mobile operating system), Blackberry (Blackberry operating system), etc., but not limited to the above system.
- an embodiment of the present invention provides an apparatus for improving security of a terminal, including:
- the startup module 11 is configured to randomly generate a dynamic password, display the dynamic password on the interface display, and start the voice monitoring device;
- the conversion extraction module 12 is configured to receive voice information obtained by the voice listening device when the user reads the dynamic password on the display interface, convert the voice information into a text password, and extract the voiceprint feature of the voice information;
- the processing module 13 is configured to obtain the text password converted by the conversion extraction module 12 and the extracted voiceprint feature, and the dynamic password generated by the startup module 11; when determining that the text password is the same as the dynamic password, according to the voiceprint feature and the pre-stored terminal Determine the user by using the correspondence between the permission and the voiceprint feature
- the terminal uses the permission, and according to the determined terminal usage permission, sets the display interface to the unlock state or the lock screen state; when it is determined that the text password is different from the dynamic password, the display interface is set to the lock screen state.
- the processing module 13 when the processing module 13 pre-stores the correspondence between the terminal usage rights and the voiceprint features, the processing module 13 is specifically configured to:
- the correspondence between the voiceprint feature, the user identity, and the terminal usage rights is saved according to a preset setting.
- the correspondence between the voiceprint feature, the user identity, and the terminal usage authority may be saved according to the settings of the owner, or the correspondence between the voiceprint feature, the user identity, and the terminal usage authority may be saved according to the preset configuration inside the terminal.
- the terminal usage rights including:
- the corresponding terminal usage rights are completely controlled.
- the corresponding terminal usage rights are partially controlled.
- the corresponding terminal usage right is prohibited control.
- the processing module 13 sets the display interface to an unlocked state or a lock screen state according to the determined terminal usage rights, including:
- the processing module 13 determines that the user's terminal usage rights are full control, sets the display interface to the unlocked state, and allows the user to access all content on the terminal; or
- the processing module 13 determines that the terminal usage right of the user is part of the control, sets the display interface to the unlocked state, and allows the user to access a preset part of the content on the terminal; or
- the processing module 13 determines that the terminal usage right of the user is prohibition control, sets the display interface to a lock screen state, and prohibits the user from accessing all content on the terminal.
- the processing module 13 is further configured to:
- the voiceprint feature extracted by the conversion extraction module 12 when the pre-stored correspondence between the terminal usage rights and the voiceprint feature does not exist, when the voiceprint feature extracted by the conversion extraction module 12 does not exist, it is determined that the user terminal usage right is prohibited control, and the display interface is set to the lock screen state, and the user is prohibited. Access all content on the terminal.
- the processing module 13 is further configured to:
- the double matching of the password and the user identity is used to determine the range of the content that the user is allowed to access when using the terminal, thereby preventing the private file leakage of the owner on the terminal, thereby improving terminal security.
- the terminal is required to have a display interface lock, a dynamic password generation, a voice acquisition, and a voiceprint recognition function.
- an embodiment of the present invention provides a method for improving security of a terminal, including:
- the terminal displays the randomly generated dynamic password through the display interface, and starts the voice monitoring device of the terminal.
- the user can illuminate the display interface of the terminal by clicking the terminal button or double-clicking the display interface.
- the user lights the terminal display interface and triggers the terminal to display the randomly generated dynamic password on the display interface, and triggers the terminal. Start its voice monitoring device.
- the dynamic password may be randomly generated by the terminal before the display interface is lit or when the display interface is lit.
- the dynamic password may be generated by a random function in the C language, and the length of the dynamic password may be a commonly used 4 bits or
- the 8-bit can also be a non-fixed length;
- the constituent elements of the dynamic password can be one or a combination of numbers, zodiac characters, and English letters, such as the terminal display interface effect diagram shown in FIG. 3a and FIG. 3b, and the dynamic password in FIG. 3a is The 8-bit English alphabet is composed, and the dynamic password in FIG. 3b is composed of 8-bit zodiac characters.
- the voice monitoring device of the terminal may be a microphone MIC on the terminal, or may be another device having the function of acquiring voice information.
- the terminal acquires voice information when the user reads the dynamic password by using the voice monitoring device, converts the voice information into a text password, and extracts a voiceprint feature of the voice information.
- the terminal display interface After the terminal display interface is lit, the user reads the dynamic password on the display interface according to the terminal instruction, and the voice receiving device of the terminal acquires the voice information when the user reads the dynamic password, converts the voice information into a text password, and extracts The voiceprint feature of the voice message. After the voice receiving device of the terminal receives the voice information when the user reads the dynamic password, the terminal turns off the voice receiving device.
- the terminal determines the user terminal usage authority according to the voiceprint feature and the pre-stored correspondence between the terminal usage authority and the voiceprint feature, and sets the display interface according to the determined terminal usage authority. Unlocked state or lock screen state; or
- the terminal sets the display interface to the lock screen state.
- the terminal pre-stores the correspondence between the terminal usage rights and the voiceprint features by the following steps:
- the terminal acquires voice information of different users through the voice monitoring device, and extracts voiceprint features of each voice information
- the terminal saves the correspondence between the voiceprint feature, the user identity, and the terminal usage authority according to a preset setting.
- the correspondence between the voiceprint feature, the user identity, and the terminal usage authority may be saved according to the settings of the owner, or the correspondence between the voiceprint feature, the user identity, and the terminal usage authority may be saved according to the preset configuration inside the terminal.
- the user identity includes the owner, the intimate person and the stranger, and the user identity
- the terminal usage rights include full control, partial control, and prohibition control, that is, the correspondence between voiceprint features, user identity, and terminal usage rights.
- the corresponding terminal usage right is completely controlled.
- the terminal usage authority is the full control, that is, since the user is the owner, the user obtains complete control over the use of the terminal. Permissions that allow users to access all content on the terminal, including the owner's private files, etc.; and/or
- the terminal usage permission is partial control, because the user is the owner of the owner, the user obtains partial control.
- the use permission of the terminal allows the user to access part of the content on the terminal.
- the content of the terminal is preset.
- the private file on the terminal is preset to prohibit access by the owner and the private file includes files such as pictures, audio, video, and documents.
- the owner can set different private files for different types of owner intimate persons, so that the terminal is more user-friendly; and/or
- the corresponding terminal usage right is Control is prohibited.
- the terminal usage permission is prohibition control. Because the user is a non-owner intimate person, the user is prohibited from accessing all the content on the terminal.
- the corresponding relationship between the voiceprint feature, the user identity, and the terminal usage authority in the embodiment of the present invention is that the terminal is saved according to the preset setting. It is required to describe the voiceprint feature, the user identity, and the terminal used in advance in the embodiment of the present invention.
- the correspondence between the rights is not limited to the above three types, and other correspondences may be set according to actual conditions.
- the terminal in S23 sets the unlock state or the lock screen state of the display interface according to the determined terminal usage rights, including:
- the terminal determines that the user's terminal usage right is full control, sets the display interface to the unlock state, and allows the user to access all content on the terminal;
- the terminal determines that the terminal usage right of the user is part of the control, and sets the display interface to the unlocked state, allowing the user to access a part of the preset content on the terminal;
- the terminal determines that the user's terminal usage right is prohibition control, sets the display interface to a lock screen state, and prohibits the user from accessing all content on the terminal.
- the method further includes:
- the terminal determines that the user's terminal usage authority is prohibited control, and the display interface is displayed. Set to lock screen state, prohibit users from accessing all content on the terminal.
- the terminal backend system can perform the following operations:
- the terminal sends the voice information when the user reads the dynamic password obtained by the voice monitoring device to a preset contact address (such as an email address); or
- the terminal sends the voice information and the terminal location information when the user reads the dynamic password obtained by the voice monitoring device to the preset contact address;
- the terminal sends the terminal location information to a preset contact address
- the terminal notifies the owner to remotely destroy the private message on the terminal (requires the terminal to have remote control function).
- a method for improving the security of a terminal according to an embodiment of the present invention which comprehensively considers whether the password is the same and the matching result of the voiceprint feature, and sets the state of the terminal display interface and the terminal usage right of the user, so as to further improve the security of the terminal.
- FIG. 2 a method for improving the security of the terminal according to the embodiment of the present invention is shown in FIG. 4, and the specific method is as follows:
- the terminal displays a randomly generated dynamic password through a display interface, and starts a voice monitoring device of the terminal.
- the terminal acquires voice information when the user reads the dynamic password by using the voice monitoring device, converts the voice information into a text password, and extracts a voiceprint feature of the voice information.
- the terminal determines whether the text password is the same as the dynamic password.
- the terminal determines whether the voiceprint feature is the same as the voiceprint feature associated with the pre-stored owner identity.
- the terminal sets the display interface to an unlocked state, determines that the user's terminal usage right is full control, and allows the user to access all content on the terminal.
- the terminal sets the display interface to an unlocked state, determines that the terminal usage right of the user is part of the control, and allows the user to access part of the content on the terminal, and part of the content on the terminal is preset;
- S408 The terminal determines whether the voiceprint feature is the same as the voiceprint feature associated with the pre-stored stranger identity
- the terminal sets the display interface to a lock screen state, determines that the user terminal usage right is prohibition control, and prohibits the user from accessing all content on the terminal;
- the terminal sets the display interface to a lock screen state, determines that the user terminal usage right is prohibition control, and prohibits the user from accessing all content on the terminal;
- the corresponding relationship between the terminal usage authority and the voiceprint feature stored in the terminal is described.
- the interface is set to the lock screen state, and the user's terminal usage permission is prohibited.
- the user is prohibited from accessing all the content on the terminal, and other processing may be performed on the user according to the preset setting.
- S410 is other processing content.
- the terminal backend system can perform the following operations:
- the terminal sends the voice information and/or the terminal location information obtained by the user when the dynamic password is read to the contact address preset by the owner.
- the contact address preset by the owner may be an email address; and/or
- the terminal requests the owner to remotely destroy the private file on the terminal (requires the terminal to have remote control function).
- the terminal sets the display interface to a lock screen state.
- the terminal display interface cannot be unlocked.
- the randomly generated dynamic password can be displayed again on the terminal display interface, so that the user can re-attempt to unlock the terminal display interface and obtain the usage right of the terminal by reading the dynamic password.
- the dynamic density displayed by the terminal is randomly generated, which may be the same as or different from the dynamic password displayed by the previous terminal.
- the relevant steps of determining the identity of the user can be implemented by the following procedure:
- the terminal display interface can display the random again.
- the generated dynamic password if the value of the password field is "Y" or "y”, it means that the dynamic password determined according to the voice information when the user reads the dynamic password is the same as the dynamic password randomly generated by the terminal.
- mode field value is master, the user is the owner; if the mode field value is not master, the user is not the owner;
- relationship field value is "Y" or "y”, it means that the user is the owner of the owner, and the mode field value is not master, indicating that the user is a stranger.
- the method further includes: the terminal pre-storing terminal usage rights Correspondence with voiceprint features.
- the terminal acquires voice information of different users through the voice monitoring device, and extracts voiceprint features of each voice information;
- the terminal saves the correspondence between the voiceprint feature, the user identity, and the terminal usage authority according to a preset setting.
- the correspondence between voiceprint features, user identity, and terminal usage rights includes:
- the corresponding terminal usage rights are completely controlled.
- the corresponding terminal usage rights are partially controlled.
- the corresponding terminal usage right is prohibited control.
- the terminal is implemented by the above method.
- the terminal displays the randomly generated dynamic password through the display interface, and starts the voice monitoring device of the terminal; the terminal acquires the voice information when the user reads the dynamic password through the voice monitoring device, and converts the voice information into a text password, and extracts
- the voiceprint feature of the voice information is set according to the matching result of the text password and the dynamic password, and the matching result of the corresponding relationship between the voiceprint feature and the pre-stored terminal usage authority and the voiceprint feature, and the unlock state or the lock screen state of the terminal display interface is set.
- the method provided by the embodiment of the present invention can be used in conjunction with the method for unlocking the display interface of the terminal in the prior art.
- the user can use the method provided by the embodiment of the present invention to improve the terminal. Practicality.
- an embodiment of the present invention provides an apparatus for improving security of a terminal, including:
- the processor 51 is configured to randomly generate a dynamic password, trigger the display 52 to display a dynamic password, and activate the voice monitoring device 53;
- a display 52 configured to display a dynamic password randomly generated by the processor 51
- the voice monitoring device 53 is configured to acquire voice information when the user reads the dynamic password on the display 52;
- the memory 54 is configured to save a correspondence between the terminal usage authority and the voiceprint feature.
- the processor 51 is further configured to convert the voice information acquired by the voice monitoring device 53 into a text password, and extract a voiceprint feature of the voice information; when determining that the text password is the same as the dynamic password, according to the voiceprint feature and pre-storing Determining the user's terminal usage rights according to the corresponding relationship between the terminal usage rights and the voiceprint feature, and setting the display 52 to the unlock state or the lock screen state according to the determined terminal usage rights; when determining the text password and the dynamic password are not in phase At the same time, the display 52 is set to a lock screen state.
- the processor 51 when the processor 51 pre-stores the correspondence between the terminal usage rights and the voiceprint features, the processor 51 is specifically configured to:
- the correspondence between the saved voiceprint feature, the user identity, and the terminal usage authority is stored in the memory 54 according to a preset setting.
- the terminal usage rights including:
- the corresponding terminal usage rights are completely controlled.
- the corresponding terminal usage rights are partially controlled.
- the corresponding terminal usage right is prohibited control.
- the processor 51 sets the display 52 to an unlocked state or a lock screen state according to the determined terminal usage right, specifically for:
- the processor 51 determines that the user's terminal usage rights are full control, and sets the display 52 to an unlocked state, allowing the user to access all content on the terminal; or
- the processor 51 determines that the terminal usage right of the user is partial control, and sets the display 52 to an unlocked state, allowing the user to access a preset partial content on the terminal; or
- the processor 51 determines that the terminal usage right of the user is prohibition control, sets the display 52 to a lock screen state, and prohibits the user from accessing all content on the terminal.
- the processor 51 is further configured to:
- the voiceprint feature extracted by the processor 51 does not exist in the corresponding relationship between the terminal usage rights and the voiceprint feature stored in advance, it is determined that the terminal usage right of the user is prohibition control, and the display is 52 is set to lock screen state, prohibiting users from accessing all content on the terminal.
- the processor 51 determines that the user's terminal usage right is prohibited control, the processor 51 is further configured to:
- Determining that the voice information when the user acquired by the voice monitoring device 53 reads the dynamic password on the display 52 is sent to a preset contact address;
- Determining that the voice information and the terminal location information when the user acquired by the voice monitoring device 53 reads the dynamic password on the display 52 is sent to a preset contact address;
- the double matching of the password and the user identity is used to determine the range of the content that the user is allowed to access when using the terminal, thereby preventing the private file leakage of the owner on the terminal, thereby improving terminal security.
- embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
Abstract
Description
Claims (18)
- 一种提升终端安全性的装置,其特征在于,包括:启动模块,用于随机产生动态密码,将所述动态密码显示在界面显示上,并启动语音监听设备;转换提取模块,用于接收语音监听设备获取的用户读取显示界面上的动态密码时的语音信息,将所述语音信息转换成文本密码,提取所述语音信息的声纹特征;处理模块,用于获取所述转换提取模块转换的文本密码和提取的声纹特征,以及所述启动模块产生的动态密码;当确定所述文本密码与所述动态密码相同时,根据所述声纹特征以及预先存储的终端使用权限与声纹特征的对应关系,确定用户的终端使用权限,并根据确定的终端使用权限,将显示界面设置为解锁状态或锁屏状态;当确定所述文本密码与所述动态密码不相同时,将所述显示界面设置为锁屏状态。
- 如权利要求1所述的装置,其特征在于,所述处理模块还用于存储终端使用权限与声纹特征的对应关系,包括:接收语音监听设备获取的不同用户的语音信息,提取所述语音信息的声纹特征;根据预先设置保存声纹特征、用户身份以及终端使用权限之间的对应关系。
- 如权利要求2所述的装置,其特征在于,根据预先设置保存的所述声纹特征、用户身份以及终端使用权限之间的对应关系,包括:对于用户身份为机主的用户对应的声纹特征,其对应的终端使用权限为完 全控制;和/或对于用户身份为机主亲密人的用户对应的声纹特征,其对应的终端使用权限为部分控制;和/或对于用户身份为陌生人的用户对应的声纹特征,其对应的终端使用权限为禁止控制。
- 如权利要求3所述的装置,其特征在于,所述处理模块根据确定的终端使用权限,将显示界面设置为解锁状态或锁屏状态,具体用于:若用户对应的用户身份为机主,则所述处理模块确定用户的终端使用权限为完全控制,将显示界面设置为解锁状态,允许用户访问终端上的所有内容;或者若用户对应的用户身份为机主亲密人,则所述处理模块确定用户的终端使用权限为部分控制,将显示界面设置为解锁状态,允许用户访问终端上的预先设置的部分内容;或者若用户对应的用户身份为陌生人,则所述处理模块确定用户的终端使用权限为禁止控制,将显示界面设置为锁屏状态,禁止用户访问终端上的所有内容。
- 如权利要求1所述的装置,其特征在于,当所述文本密码与所述动态密码相同时,所述处理模块还用于:当预先存储的终端使用权限与声纹特征的对应关系中,不存在所述转换提取模块提取的声纹特征时,确定用户的终端使用权限为禁止控制,将显示界面设置为锁屏状态,禁止用户访问终端上的所有内容。
- 如权利要求4或5所述的装置,其特征在于,所述处理模块确定用户的终端使用权限为禁止控制之后,还用于:接收语音监听设备获取的用户读取显示界面上的动态密码时的语音信息,将接收的语音信息发送到预先设置的联系地址;或者接收语音监听设备获取的用户读取显示界面上的动态密码时的语音信息,将接收的语音信息和终端位置信息发送到预先设置的联系地址;或者将终端位置信息发送到预先设置的联系地址;或者通知机主远程销毁终端上的私密文件。
- 一种提升终端安全性的方法,其特征在于,该方法包括:终端通过显示界面显示随机产生的动态密码,启动终端的语音监听设备;终端通过语音监听设备获取用户读取所述动态密码时的语音信息,将所述语音信息转换成文本密码,提取所述语音信息的声纹特征;当所述文本密码与所述动态密码相同时,终端根据所述声纹特征以及预先存储的终端使用权限与声纹特征的对应关系,确定用户的终端使用权限,并根据确定的终端使用权限,设置显示界面的解锁状态或锁屏状态;或者当所述文本密码与所述动态密码不相同时,终端将显示界面设置为锁屏状态。
- 如权利要求7所述的方法,其特征在于,终端通过以下步骤预先存储终端使用权限与声纹特征的对应关系:终端通过语音监听设备获取不同用户的语音信息,提取所述语音信息的声纹特征;终端根据预先设置保存声纹特征、用户身份以及终端使用权限之间的对应关系。
- 如权利要求8所述的方法,其特征在于,所述声纹特征、用户身份以 及终端使用权限之间的对应关系,包括:对于用户身份为机主的用户对应的声纹特征,其对应的终端使用权限为完全控制;和/或对于用户身份为机主亲密人的用户对应的声纹特征,其对应的终端使用权限为部分控制;和/或对于用户身份为陌生人的用户对应的声纹特征,其对应的终端使用权限为禁止控制。
- 如权利要求9所述的方法,其特征在于,所述终端根据确定的终端使用权限,设置显示界面的解锁状态或锁屏状态,包括:若用户对应的用户身份为机主,则终端确定用户的终端使用权限为完全控制,将显示界面设置为解锁状态,允许用户访问终端上的所有内容;或者若用户对应的用户身份为机主亲密人,则终端确定用户的终端使用权限为部分控制,将显示界面设置为解锁状态,允许用户访问终端上的预先设置的部分内容;或者若用户对应的用户身份为陌生人,则终端确定用户的终端使用权限为禁止控制,将显示界面设置为锁屏状态,禁止用户访问终端上的所有内容。
- 如权利要求7所述的方法,其特征在于,当所述文本密码与所述动态密码相同时,该方法还包括:当预先存储的终端使用权限与声纹特征的对应关系中,不存在根据用户读取动态密码时的语音信息提取的声纹特征时,终端确定用户的终端使用权限为禁止控制,并将显示界面设置为锁屏状态,禁止用户访问终端上的所有内容。
- 如权利要求10或11所述的方法,其特征在于,所述终端确定用户的 终端使用权限为禁止控制之后,该方法还包括:终端将通过语音监听设备获取的用户读取所述动态密码时的语音信息发送到预先设置的联系地址;或者终端将通过语音监听设备获取的用户读取所述动态密码时的语音信息和终端位置信息发送到预先设置的联系地址;或者终端将终端位置信息发送到预先设置的联系地址;或者终端通知机主远程销毁终端上的私密文件。
- 一种提升终端安全性的装置,其特征在于,包括:处理器,存储器,显示器,语音监听设备,所述处理器,用于随机产生动态密码,触发所述显示器显示动态密码,并启动所述语音监听设备;所述显示器,用于显示所述处理器随机产生的动态密码;所述语音监听设备,用于获取的用户读取所述显示器上的动态密码时的语音信息;所述存储器,用于保存终端使用权限与声纹特征的对应关系;所述处理器,还用于将所述语音监听设备获取的语音信息转换成文本密码,提取语音信息的声纹特征;当确定文本密码与动态密码相同时,根据声纹特征以及预先存储的终端使用权限与声纹特征的对应关系,确定用户的终端使用权限,并根据确定的终端使用权限,在所述显示器的显示界面设置为解锁状态或锁屏状态;当确定文本密码与动态密码不相同时,将所述显示器的显示界面设置为锁屏状态。
- 如权利要求13所述的装置,其特征在于,所述处理器还用于将终端使用权限与声纹特征的对应关系保存到存储器中,具体为:所述处理器接收语音监听设备获取的不同用户的语音信息,提取所述语音信息的声纹特征;根据预先设置保存声纹特征、用户身份以及终端使用权限之间的对应关系到存储器中。
- 如权利要求14所述的装置,其特征在于,所述声纹特征、用户身份以及终端使用权限之间的对应关系,包括:对于用户身份为机主的用户对应的声纹特征,其对应的终端使用权限为完全控制;和/或对于用户身份为机主亲密人的用户对应的声纹特征,其对应的终端使用权限为部分控制;和/或对于用户身份为陌生人的用户对应的声纹特征,其对应的终端使用权限为禁止控制。
- 如权利要求15所述的装置,其特征在于,所述处理器根据确定的终端使用权限,将所述显示器的显示界面设置为解锁状态或锁屏状态,具体用于:若用户对应的用户身份为机主,则所述处理器确定用户的终端使用权限为完全控制,将显示界面设置为解锁状态,允许用户访问终端上的所有内容;或者若用户对应的用户身份为机主亲密人,则所述处理器确定用户的终端使用权限为部分控制,将显示界面设置为解锁状态,允许用户访问终端上的预先设置的部分内容;或者若用户对应的用户身份为陌生人,则所述处理器确定用户的终端使用权限为禁止控制,将显示界面设置为锁屏状态,禁止用户访问终端上的所有内容。
- 如权利要求13所述的装置,其特征在于,当所述文本密码与所述动态密码相同时,所述处理器还用于:当预先存储的终端使用权限与声纹特征的对应关系中,不存在所述处理器提取的声纹特征时,确定用户的终端使用权限为禁止控制,将所述显示器的显示界面设置为锁屏状态,禁止用户访问终端上的所有内容。
- 如权利要求16或17所述的装置,其特征在于,所述处理器确定用户的终端使用权限为禁止控制之后,还用于:确定将所述语音监听设备获取的用户读取所述显示器上的动态密码时的语音信息发送到预先设置的联系地址;或者确定将所述语音监听设备获取的用户读取所述显示器上的动态密码时的语音信息和终端位置信息发送到预先设置的联系地址;或者确定将终端位置信息发送到预先设置的联系地址;或者通知机主远程销毁终端上的私密文件。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2017121266A RU2676947C2 (ru) | 2014-11-20 | 2015-11-12 | Устройство и способ повышения безопасности терминала |
JP2017527342A JP2018501557A (ja) | 2014-11-20 | 2015-11-12 | 端末セキュリティを向上させるための装置および方法 |
KR1020177016751A KR20170085571A (ko) | 2014-11-20 | 2015-11-12 | 단말의 안전성을 향상시키기 위한 장치 및 방법 |
US15/528,309 US10489568B2 (en) | 2014-11-20 | 2015-11-12 | Apparatus and methods for improving terminal security |
EP15861338.0A EP3214563B1 (en) | 2014-11-20 | 2015-11-12 | Apparatus and method for improving security of terminal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410668497.4 | 2014-11-20 | ||
CN201410668497.4A CN105678124A (zh) | 2014-11-20 | 2014-11-20 | 一种提升终端安全性的装置及方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016078541A1 true WO2016078541A1 (zh) | 2016-05-26 |
Family
ID=56013285
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/094457 WO2016078541A1 (zh) | 2014-11-20 | 2015-11-12 | 一种提升终端安全性的装置及方法 |
Country Status (7)
Country | Link |
---|---|
US (1) | US10489568B2 (zh) |
EP (1) | EP3214563B1 (zh) |
JP (1) | JP2018501557A (zh) |
KR (1) | KR20170085571A (zh) |
CN (1) | CN105678124A (zh) |
RU (1) | RU2676947C2 (zh) |
WO (1) | WO2016078541A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017028609A1 (zh) * | 2015-08-18 | 2017-02-23 | 中兴通讯股份有限公司 | 终端信息显示方法及装置 |
CN108762650A (zh) * | 2018-05-30 | 2018-11-06 | Oppo广东移动通信有限公司 | 一种熄灭终端屏幕的方法、装置和计算设备 |
CN109714466A (zh) * | 2017-10-26 | 2019-05-03 | 中国电信股份有限公司 | 动态密码认证处理方法、装置及其移动终端 |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105678124A (zh) * | 2014-11-20 | 2016-06-15 | 华为终端(东莞)有限公司 | 一种提升终端安全性的装置及方法 |
CN106155321A (zh) * | 2016-06-30 | 2016-11-23 | 联想(北京)有限公司 | 一种控制方法及电子设备 |
CN106599647A (zh) * | 2016-10-31 | 2017-04-26 | 北京无线电计量测试研究所 | 一种基于虹膜识别身份认证的计算机访问控制系统 |
CN106683673B (zh) * | 2016-12-30 | 2020-11-13 | 智车优行科技(北京)有限公司 | 驾驶模式的调整方法、装置和系统、车辆 |
CN107068149A (zh) * | 2017-03-23 | 2017-08-18 | 上海与德科技有限公司 | 解锁方法及装置 |
CN107222711A (zh) * | 2017-05-27 | 2017-09-29 | 北方民族大学 | 仓储货物的监测系统、方法及客户端 |
US10853463B2 (en) | 2018-01-17 | 2020-12-01 | Futurewei Technologies, Inc. | Echoprint user authentication |
JP6457682B1 (ja) | 2018-04-16 | 2019-01-23 | パスロジ株式会社 | 認証システム、認証方法、ならびに、プログラム |
CN108744498B (zh) * | 2018-05-17 | 2021-05-07 | 武汉微派网络科技有限公司 | 一种基于双vr设备的虚拟游戏快速启动方法 |
CN108874469B (zh) * | 2018-07-16 | 2021-10-01 | 广东小天才科技有限公司 | 一种家教设备的应用管控方法及家教设备 |
CN109087418A (zh) * | 2018-07-23 | 2018-12-25 | 江苏恒宝智能系统技术有限公司 | 一种智能解锁方法和系统 |
CN111275909B (zh) * | 2018-12-04 | 2021-12-28 | 阿里巴巴集团控股有限公司 | 一种安防预警方法及装置 |
EP3690880B1 (en) * | 2019-01-31 | 2023-11-29 | MasterCard International Incorporated | Method for communicating a non-speech message as audio |
CN113946810B (zh) * | 2021-12-07 | 2022-09-20 | 荣耀终端有限公司 | 一种应用程序的运行方法及电子设备 |
CN114466105A (zh) * | 2022-01-20 | 2022-05-10 | 微位(深圳)网络科技有限公司 | 固定电话号码的绑定方法、装置、电子设备及介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103037310A (zh) * | 2012-12-14 | 2013-04-10 | 北京网秦天下科技有限公司 | 移动终端智能防盗方法和移动终端 |
CN103531200A (zh) * | 2013-10-29 | 2014-01-22 | 宇龙计算机通信科技(深圳)有限公司 | 语音解锁方法和终端 |
WO2014017858A1 (en) * | 2012-07-25 | 2014-01-30 | Samsung Electronics Co., Ltd. | User terminal apparatus and control method thereof |
CN103685743A (zh) * | 2013-12-06 | 2014-03-26 | 上海斐讯数据通信技术有限公司 | 声控鉴权解锁系统及其解锁方法 |
CN103729584A (zh) * | 2012-10-16 | 2014-04-16 | 北京千橡网景科技发展有限公司 | 用于屏幕解锁的方法和装置 |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6249815B1 (en) * | 1998-05-06 | 2001-06-19 | At&T Corp. | Method and apparatus for building subscriber service profile based on subscriber related data |
US20010000045A1 (en) * | 1998-12-09 | 2001-03-15 | Yuan-Pin Yu | Web-based, biometric authentication system and method |
US6671672B1 (en) * | 1999-03-30 | 2003-12-30 | Nuance Communications | Voice authentication system having cognitive recall mechanism for password verification |
JP2001337929A (ja) | 2000-05-26 | 2001-12-07 | Nec Corp | 動的暗証番号管理システム |
AU2001288679A1 (en) * | 2000-09-11 | 2002-03-26 | Sentrycom Ltd. | A biometric-based system and method for enabling authentication of electronic messages sent over a network |
US8812319B2 (en) * | 2001-01-31 | 2014-08-19 | Ibiometrics, Inc. | Dynamic pass phrase security system (DPSS) |
JP2004094158A (ja) | 2002-09-04 | 2004-03-25 | Ntt Comware Corp | 母音検索を利用した声紋認証装置 |
US8171298B2 (en) * | 2002-10-30 | 2012-05-01 | International Business Machines Corporation | Methods and apparatus for dynamic user authentication using customizable context-dependent interaction across multiple verification objects |
JP4163979B2 (ja) * | 2003-03-17 | 2008-10-08 | Kddi株式会社 | 話者認証装置 |
JP2004287674A (ja) | 2003-03-20 | 2004-10-14 | Nec Corp | 情報処理装置、不正使用防止方法、およびプログラム |
JP4463526B2 (ja) * | 2003-10-24 | 2010-05-19 | 株式会社ユニバーサルエンターテインメント | 声紋認証システム |
US8255223B2 (en) * | 2004-12-03 | 2012-08-28 | Microsoft Corporation | User authentication by combining speaker verification and reverse turing test |
JP2006186589A (ja) * | 2004-12-27 | 2006-07-13 | Olympus Imaging Corp | 表示制御装置及び表示制御方法 |
KR100690565B1 (ko) | 2005-07-08 | 2007-03-09 | 에스케이 텔레콤주식회사 | 분실된 이동통신 단말기에 저장된 개인 정보 삭제 시스템및 방법 |
CN1997188A (zh) * | 2006-01-06 | 2007-07-11 | 乐金电子(中国)研究开发中心有限公司 | 一种识别用户身份的方法及其手机 |
US8499342B1 (en) * | 2008-09-09 | 2013-07-30 | At&T Intellectual Property I, L.P. | Systems and methods for using voiceprints to generate passwords on mobile devices |
US8082448B2 (en) * | 2008-10-28 | 2011-12-20 | Xerox Corporation | System and method for user authentication using non-language words |
WO2011004499A1 (ja) * | 2009-07-10 | 2011-01-13 | 富士通株式会社 | 電子機器、そのセキュリティ方法、そのセキュリティプログラム及び記録媒体 |
CN101997849A (zh) * | 2009-08-18 | 2011-03-30 | 阿里巴巴集团控股有限公司 | 一种互联网用户身份验证的方法、装置及系统 |
US8824749B2 (en) * | 2011-04-05 | 2014-09-02 | Microsoft Corporation | Biometric recognition |
CN102930221A (zh) * | 2011-08-09 | 2013-02-13 | 三星电子(中国)研发中心 | 一种保护手持设备中数据的方法 |
EP2560122B1 (en) * | 2011-08-18 | 2018-11-14 | The Francine Gani 2002 Living Trust | Multi-Channel Multi-Factor Authentication |
US20150051913A1 (en) | 2012-03-16 | 2015-02-19 | Lg Electronics Inc. | Unlock method using natural language processing and terminal for performing same |
US20140188468A1 (en) * | 2012-12-28 | 2014-07-03 | Dmitry Dyrmovskiy | Apparatus, system and method for calculating passphrase variability |
KR20150012464A (ko) * | 2013-07-25 | 2015-02-04 | 삼성전자주식회사 | 디스플레이 장치 및 개인화 서비스 제공 방법 |
CN104008320A (zh) | 2014-05-19 | 2014-08-27 | 惠州Tcl移动通信有限公司 | 基于人脸识别的使用权限和用户模式控制方法及系统 |
CN105678124A (zh) * | 2014-11-20 | 2016-06-15 | 华为终端(东莞)有限公司 | 一种提升终端安全性的装置及方法 |
-
2014
- 2014-11-20 CN CN201410668497.4A patent/CN105678124A/zh active Pending
-
2015
- 2015-11-12 WO PCT/CN2015/094457 patent/WO2016078541A1/zh active Application Filing
- 2015-11-12 RU RU2017121266A patent/RU2676947C2/ru active
- 2015-11-12 EP EP15861338.0A patent/EP3214563B1/en active Active
- 2015-11-12 JP JP2017527342A patent/JP2018501557A/ja active Pending
- 2015-11-12 US US15/528,309 patent/US10489568B2/en active Active
- 2015-11-12 KR KR1020177016751A patent/KR20170085571A/ko not_active Application Discontinuation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014017858A1 (en) * | 2012-07-25 | 2014-01-30 | Samsung Electronics Co., Ltd. | User terminal apparatus and control method thereof |
CN103729584A (zh) * | 2012-10-16 | 2014-04-16 | 北京千橡网景科技发展有限公司 | 用于屏幕解锁的方法和装置 |
CN103037310A (zh) * | 2012-12-14 | 2013-04-10 | 北京网秦天下科技有限公司 | 移动终端智能防盗方法和移动终端 |
CN103531200A (zh) * | 2013-10-29 | 2014-01-22 | 宇龙计算机通信科技(深圳)有限公司 | 语音解锁方法和终端 |
CN103685743A (zh) * | 2013-12-06 | 2014-03-26 | 上海斐讯数据通信技术有限公司 | 声控鉴权解锁系统及其解锁方法 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017028609A1 (zh) * | 2015-08-18 | 2017-02-23 | 中兴通讯股份有限公司 | 终端信息显示方法及装置 |
CN109714466A (zh) * | 2017-10-26 | 2019-05-03 | 中国电信股份有限公司 | 动态密码认证处理方法、装置及其移动终端 |
CN108762650A (zh) * | 2018-05-30 | 2018-11-06 | Oppo广东移动通信有限公司 | 一种熄灭终端屏幕的方法、装置和计算设备 |
Also Published As
Publication number | Publication date |
---|---|
KR20170085571A (ko) | 2017-07-24 |
US20170316194A1 (en) | 2017-11-02 |
EP3214563B1 (en) | 2020-08-12 |
RU2017121266A (ru) | 2018-12-20 |
RU2676947C2 (ru) | 2019-01-11 |
CN105678124A (zh) | 2016-06-15 |
EP3214563A1 (en) | 2017-09-06 |
EP3214563A4 (en) | 2017-10-11 |
US10489568B2 (en) | 2019-11-26 |
JP2018501557A (ja) | 2018-01-18 |
RU2017121266A3 (zh) | 2018-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016078541A1 (zh) | 一种提升终端安全性的装置及方法 | |
CN105787324A (zh) | 一种计算机信息安全系统 | |
US10860739B2 (en) | Encryption of media based on content | |
US9461987B2 (en) | Audio authentication system | |
US8706158B2 (en) | Mobile phone for authenticating SIM card and method thereof | |
WO2014169627A1 (zh) | 一种应用解锁方法及装置 | |
US9319875B2 (en) | Authentication for deciphering ciphertext and displaying deciphered information | |
CN106778295B (zh) | 文件存储、显示方法、装置及终端 | |
CN103324874A (zh) | 一种验证方法及一种电子设备 | |
CN103701586A (zh) | 获取密钥的方法和装置 | |
CN106357678A (zh) | 一种智能终端的云加密存储方法及智能终端 | |
WO2017020437A1 (zh) | 一种信息加密方法及终端设备 | |
WO2016050118A1 (zh) | 信息处理方法和信息处理装置 | |
WO2015196642A1 (zh) | 数据加密方法、解密方法及装置 | |
CN102902933B (zh) | 基于文件碎片化处理的文件保存方法 | |
JP2011192154A (ja) | Usbストレージデバイス | |
WO2017193517A1 (zh) | 一种用户终端的解密方法及系统 | |
WO2016026319A1 (zh) | 一种鉴权方法及终端 | |
JP2020004424A (ja) | モバイル端末のプライバシー保護方法および保護装置、並びにモバイル端末 | |
JP2015233263A (ja) | 認証システム及び認証方法 | |
CN111259387B (zh) | 一种检测被篡改的应用的方法及设备 | |
CN111601038B (zh) | 一种摄像头的控制方法及装置、电子终端及存储介质 | |
CN105787329A (zh) | 一种基于综合识别的加密方法及系统 | |
CN106295274B (zh) | 一种应用程序控制方法及装置 | |
CN204926093U (zh) | 基于人脸识别技术的计算机信息安全防护系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15861338 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2017527342 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15528309 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2015861338 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20177016751 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2017121266 Country of ref document: RU Kind code of ref document: A |